CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
99.0%
There is a buffer overflow vulnerability in multiple Symantec firewall products in which attempts to process a specially crafted NetBIOS Name Service (NBNS) response packet could allow an unauthenticated, remote attacker to execute arbitrary code with kernel privileges.
Symantec offers a suite of corporate and consumer security products including a firewall application. The firewall application includes a SYMDNS.SYS
driver, which is responsible for validating DNS and NBNS responses. There is a buffer overflow vulnerability in the routines responsible for processing incoming NBNS responses. By supplying a specially crafted NBNS packet, an attacker could cause a stack overflow allowing arbitrary locations in memory to be overwritten.
According to the Symantec Advisory, the following products are affected:
Consumer:
Symantec Norton Internet Security and Professional 2002, 2003, 2004
Symantec Norton Personal Firewall 2002, 2003, 2004
Symantec Norton AntiSpam 2004
Corporate:
Symantec Client Firewall 5.01, 5.1.1
Symantec Client Security 1.0, 1.1, 2.0(SCF 7.1)
An unauthenticated, remote attacker could execute arbitrary code with kernel privileges on a vulnerable system. According to the eEye Digital Security Advisory, in order for this vulnerability to be exploited, the firewall must be configured to allow incoming 137/udp packets. This configuration is not present by default.
Apply Patch
Symantec recommends that clients running corporate versions of the affected products apply patches obtained through their appropriate support channels.
Use LiveUpdate
Symantec recommends that clients running consumer versions of the affected products use the LiveUpdate feature to ensure all updates are installed. According to Symantec, this can be done as follows:
* `Open any installed Symantec product`
* `Click on LiveUpdate in the toolbar`
* `Run LiveUpdate until Symantec LiveUpdate indicated that all installed Symantec products are up-to-date`
* `Depending on the application, system may require a reboot to effectively update available fixes`
634414
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: May 13, 2004
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please refer to Symantec Security Advisory SYM04-008.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23634414 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This vulnerability was reported by eEye Digital Security.
This document was written by Damon Morda and based on information contained in the eEye Digital Security Advisory.
CVE IDs: | CVE-2004-0444 |
---|---|
Severity Metric: | 21.09 Date Public: |